Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

In #1, use keys at least 2048 bits long.

Last time I talked about the subject, I didn't think it was worthwhile to point that. Now it clearly is.

Also, I don't see much advantage in #4.



There is no security advantage to #4 (security through obscurity is no security) other than it prevents anyone getting a ping by sweeping Port 22, they actively have to look for an SSH port which will trip fail2ban.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: